atec Backup Security & Risk Analysis

wordpress.org/plugins/atec-backup

All-in-one backup and restore solution – fast & reliable.

30 active installs v1.1.37 PHP 7.4+ WP 4.9+ Updated Unknown
backupdatabasefilesftprestore
100
A · Safe
CVEs total0
Unpatched0
Last CVENever
Safety Verdict

Is atec Backup Safe to Use in 2026?

Generally Safe

Score 100/100

atec Backup has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.

No known CVEs
Risk Assessment

The "atec-backup" plugin version 1.1.37 exhibits a mixed security posture. On the positive side, it demonstrates good practices in output escaping, with 99% of outputs being properly handled, and it shows a commendable absence of known historical vulnerabilities (CVEs). The plugin also utilizes prepared statements for a majority of its SQL queries, which is a strong defense against SQL injection.

However, a significant concern arises from the presence of one AJAX handler that lacks any authentication checks. This represents a direct and unprotected entry point into the plugin's functionality, creating a potential avenue for attackers to interact with the plugin without proper authorization. While taint analysis and static code signals related to dangerous functions are absent, this single unprotected entry point is a critical weakness that could be exploited if the AJAX handler performs sensitive operations. The plugin's history of zero vulnerabilities is a positive indicator of developer diligence, but it cannot negate the immediate risk presented by the unprotected AJAX handler.

In conclusion, while "atec-backup" v1.1.37 has strengths in output sanitization and SQL query practices, and a clean vulnerability history, the unprotected AJAX handler introduces a notable security risk. This unprotected entry point is the primary area requiring immediate attention and remediation to improve the plugin's overall security.

Key Concerns

  • AJAX handler without authentication check
Vulnerabilities
None known

atec Backup Security Vulnerabilities

No known vulnerabilities — this is a good sign.
Code Analysis
Analyzed Mar 16, 2026

atec Backup Code Analysis

Dangerous Functions
0
Raw SQL Queries
7
10 prepared
Unescaped Output
5
339 escaped
Nonce Checks
2
Capability Checks
5
File Operations
20
External Requests
1
Bundled Libraries
0

SQL Query Safety

59% prepared17 total queries

Output Escaping

99% escaped344 total outputs
Attack Surface
1 unprotected

atec Backup Attack Surface

Entry Points1
Unprotected1

AJAX Handlers 1

authwp_ajax_atec_admin_notice_dismissincludes\ATEC\LOADER.php:109
WordPress Hooks 7
actionadmin_menuatec-backup.php:29
actionadmin_initatec-backup.php:30
filtercron_schedulesatec-backup.php:41
actionadmin_enqueue_scriptsincludes\ATEC\INIT.php:564
actionadmin_noticesincludes\ATEC\INIT.php:647
actionadmin_footerincludes\ATEC\INIT.php:688
actionadmin_noticesincludes\ATEC\INIT.php:720
Maintenance & Trust

atec Backup Maintenance & Trust

Maintenance Signals

WordPress version tested6.9.4
Last updatedUnknown
PHP min version7.4
Downloads3K

Community Trust

Rating100/100
Number of ratings1
Active installs30
Developer Profile

atec Backup Developer Profile

docjojo

16 plugins · 3K total installs

99
trust score
Avg Security Score
99/100
Avg Patch Time
1 days
View full developer profile
Detection Fingerprints

How We Detect atec Backup

Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.

Asset Fingerprints

Asset Paths
/wp-content/plugins/atec-backup/includes/atec-wpb-tools.php
Version Parameters
atec-backup/style.css?ver=atec-backup/script.js?ver=

HTML / DOM Fingerprints

Data Attributes
data-atec-slugdata-atec-actiondata-atec-nonce
JS Globals
ATEC
FAQ

Frequently Asked Questions about atec Backup